hfiref0x / CVE-2015-1701View external linksLinks
Win32k LPE vulnerability used in APT attack
☆291Dec 18, 2017Updated 8 years ago
Alternatives and similar repositories for CVE-2015-1701
Users that are interested in CVE-2015-1701 are comparing it to the libraries listed below
Sorting:
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆325May 9, 2016Updated 9 years ago
- MS15-076 Privilege Escalation☆101Sep 21, 2015Updated 10 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Jan 25, 2021Updated 5 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- Previously-0day exploit from the Hacking Team leak, written by Eugene Ching/Qavar.☆203Jul 21, 2015Updated 10 years ago
- Exploiting MS15-061 local Privilege escalation☆49Sep 22, 2015Updated 10 years ago
- ☆10Aug 13, 2015Updated 10 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063)☆50Jun 27, 2016Updated 9 years ago
- Windows kernel vulnerability in win32k.sys Driver☆35Dec 6, 2015Updated 10 years ago
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- ZeroAccess v3 toolkit☆166Dec 18, 2017Updated 8 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 10 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 8 years ago
- Internet Explorer Exploit with CFG bypass for Windows 10☆59Jan 11, 2017Updated 9 years ago
- My musings with PowerShell☆2,705Nov 19, 2021Updated 4 years ago
- my public code☆167Jan 11, 2017Updated 9 years ago
- Trigger and exploit code for CVE-2014-4113☆42Feb 14, 2016Updated 9 years ago
- POC and exploitation of vulnerabilities☆91Mar 22, 2022Updated 3 years ago
- ☆128Oct 19, 2016Updated 9 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- Miscellaneous exploit code☆1,570Oct 6, 2023Updated 2 years ago
- A windbg extension, extracting token related contents☆41Dec 23, 2020Updated 5 years ago
- Exploit primitives for PowerShell☆437Mar 25, 2018Updated 7 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Mar 12, 2014Updated 11 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆265Jul 6, 2017Updated 8 years ago
- Some example source code for fixed IE11 sandbox escapes.☆141Aug 21, 2014Updated 11 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- A collection of curated Java Deserialization Exploits☆592May 16, 2021Updated 4 years ago
- ☆24Feb 21, 2016Updated 9 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- Metasploit AV Evasion Tool☆256Dec 22, 2015Updated 10 years ago
- VMware Escape Exploit before VMware WorkStation 12.5.5☆914Nov 7, 2023Updated 2 years ago
- Loading unsigned code into kernel in Windows 10 (64) with help of VMware Workstation Pro/Player design flaw☆141Apr 4, 2017Updated 8 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,547Aug 2, 2019Updated 6 years ago
- Source from VMDE paper, adapted to 2015☆189Dec 18, 2017Updated 8 years ago